A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
References
Link | Resource |
---|---|
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914 | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/46453/ | Exploit Third Party Advisory VDB Entry |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914 | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/46453/ | Exploit Third Party Advisory VDB Entry |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914 - Mitigation, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/46453/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory |
Information
Published : 2018-07-23 19:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999002
Mitre link : CVE-2018-1999002
CVE.ORG link : CVE-2018-1999002
JSON object : View
Products Affected
jenkins
- jenkins
oracle
- communications_cloud_native_core_automated_test_suite
CWE